全文获取类型
收费全文 | 18432篇 |
免费 | 1632篇 |
国内免费 | 1061篇 |
专业分类
电工技术 | 1521篇 |
技术理论 | 3篇 |
综合类 | 2257篇 |
化学工业 | 374篇 |
金属工艺 | 401篇 |
机械仪表 | 880篇 |
建筑科学 | 1264篇 |
矿业工程 | 305篇 |
能源动力 | 232篇 |
轻工业 | 207篇 |
水利工程 | 349篇 |
石油天然气 | 289篇 |
武器工业 | 87篇 |
无线电 | 3641篇 |
一般工业技术 | 1205篇 |
冶金工业 | 608篇 |
原子能技术 | 18篇 |
自动化技术 | 7484篇 |
出版年
2025年 | 82篇 |
2024年 | 277篇 |
2023年 | 293篇 |
2022年 | 405篇 |
2021年 | 445篇 |
2020年 | 642篇 |
2019年 | 444篇 |
2018年 | 485篇 |
2017年 | 465篇 |
2016年 | 525篇 |
2015年 | 682篇 |
2014年 | 1161篇 |
2013年 | 1196篇 |
2012年 | 1395篇 |
2011年 | 1398篇 |
2010年 | 1114篇 |
2009年 | 1193篇 |
2008年 | 1308篇 |
2007年 | 1412篇 |
2006年 | 1223篇 |
2005年 | 1148篇 |
2004年 | 932篇 |
2003年 | 739篇 |
2002年 | 546篇 |
2001年 | 413篇 |
2000年 | 355篇 |
1999年 | 217篇 |
1998年 | 143篇 |
1997年 | 110篇 |
1996年 | 93篇 |
1995年 | 66篇 |
1994年 | 65篇 |
1993年 | 33篇 |
1992年 | 18篇 |
1991年 | 13篇 |
1990年 | 14篇 |
1989年 | 11篇 |
1988年 | 7篇 |
1987年 | 5篇 |
1986年 | 7篇 |
1985年 | 4篇 |
1984年 | 4篇 |
1982年 | 4篇 |
1981年 | 6篇 |
1980年 | 5篇 |
1973年 | 3篇 |
1958年 | 2篇 |
1957年 | 2篇 |
1956年 | 2篇 |
1955年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
2.
3.
对高校图书馆参考咨询服务的探讨 总被引:2,自引:0,他引:2
面对现代信息时代的挑战,高校图书馆参考咨询服务进行着深刻的变革,其系统化、网络化、合作化、社会化、高效化是这种变革的集中体现。 相似文献
4.
5.
The broadband integrated services digital networks (B-ISDN) based on asynchronous transfer mode (ATM) technology can support
a wide range of applications such as voice, video, still images, and data. Compression techniques increase the effective bandwidth
utilization, but the bursty and asynchronous nature of the traffic can still lead to congestion in the network, and degradation
of image quality and quality of service (QOS). Some of the features to provide better coding schemes for ATM networks are
layered coding, resynchronization, buffering, interleaved schemes, constrained bit rate due to buffers, encapsulation with
the RTP or AAL1 for clock recovery, lapped transforms, motion compensation, and optimal bit allocation for coders based on
wavelet transforms. We review various techniques forimage and video coding such as transforms, motion compensation, vector
quantization, and subband coding. We outline the impact of the cell loss ratio (CLR), delay and cell delay variation (CDV)
on video coding: blocking effects, loss of frame synchronization, motion vectors, and vector quantization codewords. The open
problems include tuning coding parameters to the available QOS provided by the network. 相似文献
6.
Service life planning comprises a model for the determination of a reasonable expected service life for buildings and components, and it establishes a routine for the assessment of design alternatives. A design option is considered reasonable when it meets or exceeds performance requirements over time that have been drawn up specifically for the specific project. Due to this assessment reference, there is a very evident link to the concept of performance-based building. Any stakeholder involved in the value chain or in the design process of the building, as well as regulators and building users, can express performance requirements. Identified requirements, both in relevance and in quality, will vary with the stakeholder and his/her perspective of interest. As building sector manufacturers develop most products with reference to standards rather than with reference to specific requirements, there is no direct link from user requirements to the product design. Instead, the building designer has the responsibility to ensure performance requirements are met by the performance of products integrated into the design. As these design decisions also have to be made at the material and component level, a performance-based building would benefit from an established rationale that enables the communication of performance requirements across the relevant system levels in the relevant design processes. A path for the connection of the established concepts of service life planning and performance-based building is presented. The aim is to identify key elements that need to be developed for the successful linkage of performance-based building with service life planning. 相似文献
7.
8.
Business intelligence approach to supporting strategy-making of ISP service management 总被引:2,自引:0,他引:2
The recent deregulation of telecommunication industry by the Taiwanese government has brought about the acute competition for Internet Service Providers (ISP). Taiwan’s ISP industry is characterized by the heavy pressure for raising revenue after hefty capital investments of last decade and the lack of knowledge to develop competitive strategies. To attract subscribers, all ISP dealers are making an all-out effort to improve their service management. This study proposes a Business Intelligence process for ISP dealers in Taiwan to assist management in developing effective service management strategies. We explore the customers’ usage characteristics and preference knowledge through applying the attribute-oriented induction (AOI) method on IP traffic data of users. Using the self-organizing map (SOM) method, we are able to divide customers into clusters with different usage behavior patterns. We then apply RFM modeling to calibrate customers’ value of each cluster, which will enable the management to develop direct and effective marketing strategies. For network resource management, this research mines the facility utilization over various administrative districts of the region, which could assist management in planning for effective network facilities investment. With actual data from one major ISP, we develop a BI decision support system with visual presentation, which is well received by its management staff. 相似文献
9.
Sharon Christensen William J. Caelli William D. Duncan 《Information & Communications Technology Law》2010,19(1):61-85
Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia. 相似文献
10.
政务信息资源中心框架设计及关键技术研究 总被引:1,自引:0,他引:1
张家锐 《计算机应用与软件》2011,28(8):117-119
目前国内有关政务信息资源共享的研究及应用还停留在网络互联互通、信息资源整合、点对点数据交换阶段,并没有达到"协同工作"的要求.鉴于此,提出了政务信息资源中心的概念,实现政务信息资源的统一获取、统一管理、规则化和规模化服务.结合工作实践,对其组成、总体框架、技术架构进行了设计,并就实现时需要解决的关键技术进行了研究. 相似文献